Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1mN3c3LTZwamMtd3dtNs3Mhg
Apache Tomcat affected by vulnerability in TLS and SSL protocol
The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.
Apache Tomcat was affected by this issue and introduced a workaround in versions 7.0.10, 6.0.32, and 5.5.33.
Permalink: https://github.com/advisories/GHSA-f7w7-6pjc-wwm6JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1mN3c3LTZwamMtd3dtNs3Mhg
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 2 years ago
Updated: 2 months ago
Identifiers: GHSA-f7w7-6pjc-wwm6, CVE-2009-3555
References:
- https://nvd.nist.gov/vuln/detail/CVE-2009-3555
- https://bugzilla.mozilla.org/show_bug.cgi?id=526689
- https://bugzilla.mozilla.org/show_bug.cgi?id=545755
- https://bugzilla.redhat.com/show_bug.cgi?id=533125
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-049
- https://exchange.xforce.ibmcloud.com/vulnerabilities/54158
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
- https://kb.bluecoat.com/index?page=content&id=SA50
- https://support.f5.com/kb/en-us/solutions/public/10000/700/sol10737.html
- https://svn.resiprocate.org/rep/ietf-drafts/ekr/draft-rescorla-tls-renegotiate.txt
- https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00428.html
- https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00442.html
- https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00449.html
- https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00634.html
- https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00645.html
- https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00944.html
- https://www.redhat.com/archives/fedora-package-announce/2009-December/msg01020.html
- https://www.redhat.com/archives/fedora-package-announce/2009-December/msg01029.html
- http://archives.neohapsis.com/archives/bugtraq/2013-11/0120.html
- http://blog.g-sec.lu/2009/11/tls-sslv3-renegotiation-vulnerability.html
- http://blogs.iss.net/archive/sslmitmiscsrf.html
- http://blogs.sun.com/security/entry/vulnerability_in_tls_protocol_during
- http://clicky.me/tlsvuln
- http://extendedsubset.com/?p=8
- http://extendedsubset.com/Renegotiating_TLS.pdf
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01945686
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02436041
- http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
- http://kbase.redhat.com/faq/docs/DOC-20491
- http://lists.apple.com/archives/security-announce/2010//May/msg00001.html
- http://lists.apple.com/archives/security-announce/2010//May/msg00002.html
- http://lists.apple.com/archives/security-announce/2010/Jan/msg00000.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039561.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039957.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-May/040652.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049455.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049528.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049702.html
- http://lists.gnu.org/archive/html/gnutls-devel/2009-11/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00014.html
- http://marc.info/?l=apache-httpd-announce&m=125755783724966&w=2
- http://marc.info/?l=bugtraq&m=126150535619567&w=2
- http://marc.info/?l=bugtraq&m=127128920008563&w=2
- http://marc.info/?l=bugtraq&m=127419602507642&w=2
- http://marc.info/?l=bugtraq&m=127557596201693&w=2
- http://marc.info/?l=bugtraq&m=130497311408250&w=2
- http://marc.info/?l=bugtraq&m=132077688910227&w=2
- http://marc.info/?l=bugtraq&m=133469267822771&w=2
- http://marc.info/?l=bugtraq&m=134254866602253&w=2
- http://marc.info/?l=bugtraq&m=142660345230545&w=2
- http://marc.info/?l=cryptography&m=125752275331877&w=2
- http://openbsd.org/errata45.html#010_openssl
- http://openbsd.org/errata46.html#004_openssl
- http://seclists.org/fulldisclosure/2009/Nov/139
- http://security.gentoo.org/glsa/glsa-200912-01.xml
- http://security.gentoo.org/glsa/glsa-201203-22.xml
- http://security.gentoo.org/glsa/glsa-201406-32.xml
- http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.597446
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-273350-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-273029-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-274990-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021653.1-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021752.1-1
- http://support.apple.com/kb/HT4004
- http://support.apple.com/kb/HT4170
- http://support.apple.com/kb/HT4171
- http://support.avaya.com/css/P8/documents/100070150
- http://support.avaya.com/css/P8/documents/100081611
- http://support.avaya.com/css/P8/documents/100114315
- http://support.avaya.com/css/P8/documents/100114327
- http://support.citrix.com/article/CTX123359
- http://support.zeus.com/zws/media/docs/4.3/RELEASE_NOTES
- http://support.zeus.com/zws/news/2010/01/13/zws_4_3r5_released
- http://sysoev.ru/nginx/patch.cve-2009-3555.txt
- http://tomcat.apache.org/native-doc/miscellaneous/changelog-1.1.x.html
- http://ubuntu.com/usn/usn-923-1
- http://wiki.rpath.com/Advisories:rPSA-2009-0155
- http://www-01.ibm.com/support/docview.wss?uid=swg1IC67848
- http://www-01.ibm.com/support/docview.wss?uid=swg1IC68054
- http://www-01.ibm.com/support/docview.wss?uid=swg1IC68055
- http://www-01.ibm.com/support/docview.wss?uid=swg1PM12247
- http://www-01.ibm.com/support/docview.wss?uid=swg21426108
- http://www-01.ibm.com/support/docview.wss?uid=swg21432298
- http://www-01.ibm.com/support/docview.wss?uid=swg24006386
- http://www-01.ibm.com/support/docview.wss?uid=swg24025312
- http://www-1.ibm.com/support/search.wss?rs=0&q=PM00675&apar=only
- http://www.arubanetworks.com/support/alerts/aid-020810.txt
- http://www.betanews.com/article/1257452450
- http://www.cisco.com/en/US/products/products_security_advisory09186a0080b01d1d.shtml
- http://www.debian.org/security/2009/dsa-1934
- http://www.debian.org/security/2011/dsa-2141
- http://www.debian.org/security/2015/dsa-3253
- http://www.educatedguesswork.org/2009/11/understanding_the_tls_renegoti.html
- http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS10-030/index.html
- http://www.ietf.org/mail-archive/web/tls/current/msg03928.html
- http://www.ietf.org/mail-archive/web/tls/current/msg03948.html
- http://www.ingate.com/Relnote.php?ver=481
- http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02512995
- http://www.kb.cert.org/vuls/id/120541
- http://www.links.org/?p=780
- http://www.links.org/?p=786
- http://www.links.org/?p=789
- http://www.mandriva.com/security/advisories?name=MDVSA-2010:076
- http://www.mandriva.com/security/advisories?name=MDVSA-2010:084
- http://www.mandriva.com/security/advisories?name=MDVSA-2010:089
- http://www.mozilla.org/security/announce/2010/mfsa2010-22.html
- http://www.openoffice.org/security/cves/CVE-2009-3555.html
- http://www.openssl.org/news/secadv_20091111.txt
- http://www.openwall.com/lists/oss-security/2009/11/05/3
- http://www.openwall.com/lists/oss-security/2009/11/05/5
- http://www.openwall.com/lists/oss-security/2009/11/06/3
- http://www.openwall.com/lists/oss-security/2009/11/07/3
- http://www.openwall.com/lists/oss-security/2009/11/20/1
- http://www.openwall.com/lists/oss-security/2009/11/23/10
- http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html
- http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html
- http://www.proftpd.org/docs/RELEASE_NOTES-1.3.2c
- http://www.redhat.com/support/errata/RHSA-2010-0119.html
- http://www.redhat.com/support/errata/RHSA-2010-0130.html
- http://www.redhat.com/support/errata/RHSA-2010-0155.html
- http://www.redhat.com/support/errata/RHSA-2010-0165.html
- http://www.redhat.com/support/errata/RHSA-2010-0167.html
- http://www.redhat.com/support/errata/RHSA-2010-0337.html
- http://www.redhat.com/support/errata/RHSA-2010-0338.html
- http://www.redhat.com/support/errata/RHSA-2010-0339.html
- http://www.redhat.com/support/errata/RHSA-2010-0768.html
- http://www.redhat.com/support/errata/RHSA-2010-0770.html
- http://www.redhat.com/support/errata/RHSA-2010-0786.html
- http://www.redhat.com/support/errata/RHSA-2010-0807.html
- http://www.redhat.com/support/errata/RHSA-2010-0865.html
- http://www.redhat.com/support/errata/RHSA-2010-0986.html
- http://www.redhat.com/support/errata/RHSA-2010-0987.html
- http://www.redhat.com/support/errata/RHSA-2011-0880.html
- http://www.securegoose.org/2009/11/tls-renegotiation-vulnerability-cve.html
- http://www.tombom.co.uk/blog/?p=85
- http://www.ubuntu.com/usn/USN-1010-1
- http://www.ubuntu.com/usn/USN-927-1
- http://www.ubuntu.com/usn/USN-927-4
- http://www.ubuntu.com/usn/USN-927-5
- http://www.us-cert.gov/cas/techalerts/TA10-222A.html
- http://www.us-cert.gov/cas/techalerts/TA10-287A.html
- http://www.vmware.com/security/advisories/VMSA-2010-0019.html
- http://www.vmware.com/security/advisories/VMSA-2011-0003.html
- http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html
- https://access.redhat.com/errata/RHSA-2009:1579
- https://access.redhat.com/errata/RHSA-2009:1580
- https://access.redhat.com/errata/RHSA-2009:1694
- https://access.redhat.com/errata/RHSA-2010:0011
- https://access.redhat.com/errata/RHSA-2010:0119
- https://access.redhat.com/errata/RHSA-2010:0130
- https://access.redhat.com/errata/RHSA-2010:0155
- https://access.redhat.com/errata/RHSA-2010:0162
- https://access.redhat.com/errata/RHSA-2010:0163
- https://access.redhat.com/errata/RHSA-2010:0164
- https://access.redhat.com/errata/RHSA-2010:0165
- https://access.redhat.com/errata/RHSA-2010:0166
- https://access.redhat.com/errata/RHSA-2010:0167
- https://access.redhat.com/errata/RHSA-2010:0337
- https://access.redhat.com/errata/RHSA-2010:0338
- https://access.redhat.com/errata/RHSA-2010:0339
- https://access.redhat.com/errata/RHSA-2010:0408
- https://access.redhat.com/errata/RHSA-2010:0440
- https://access.redhat.com/errata/RHSA-2010:0768
- https://access.redhat.com/errata/RHSA-2010:0770
- https://access.redhat.com/errata/RHSA-2010:0786
- https://access.redhat.com/errata/RHSA-2010:0807
- https://access.redhat.com/errata/RHSA-2010:0865
- https://access.redhat.com/errata/RHSA-2010:0986
- https://access.redhat.com/errata/RHSA-2010:0987
- https://access.redhat.com/errata/RHSA-2011:0880
- https://access.redhat.com/errata/RHSA-2015:1591
- https://access.redhat.com/security/cve/CVE-2009-3555
- https://github.com/apache/tomcat/commit/14e4efd925da58b9fa63f20969fb7349b8a9c30d
- https://github.com/apache/tomcat/commit/2d4ca03acc27cc883c404d1745d92f983b6fada3
- https://github.com/apache/tomcat/commit/30af3f5630542a2340781f66553e734a6fd69701
- https://github.com/apache/tomcat/commit/328a523cbb2a2d4cd55283180614d4e03e2f8f02
- https://github.com/apache/tomcat/commit/3d315ac9dfaa2c03b4df82938d78bf5b755766b3
- https://github.com/apache/tomcat/commit/56f67141e82e16f68a860c3af9b7342da35cbe7d
- https://github.com/apache/tomcat/commit/b4e9488629bf03b4b65abf335e536e85386d1366
- https://github.com/apache/tomcat/commit/df9633116b5fec8f47f1f008fb89a6e9d5895cd0
- https://bz.apache.org/bugzilla/show_bug.cgi?id=50325
- https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d@<dev.tomcat.apache.org>
- https://lists.apache.org/thread.html/f8e0814e11c7f21f42224b6de111cb3f5e5ab5c15b78924c516d4ec2@<dev.tomcat.apache.org>
- https://lists.apache.org/thread.html/re3b72cbb13e1dfe85c4a06959a3b6ca6d939b407ecca80db12b54220@<dev.tomcat.apache.org>
- https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d@<dev.tomcat.apache.org>
- https://oval.cisecurity.org/repository/search/definition/oval:org.mitre.oval:def:10088
- https://oval.cisecurity.org/repository/search/definition/oval:org.mitre.oval:def:11578
- https://oval.cisecurity.org/repository/search/definition/oval:org.mitre.oval:def:11617
- https://oval.cisecurity.org/repository/search/definition/oval:org.mitre.oval:def:7315
- https://oval.cisecurity.org/repository/search/definition/oval:org.mitre.oval:def:7478
- https://oval.cisecurity.org/repository/search/definition/oval:org.mitre.oval:def:7973
- https://oval.cisecurity.org/repository/search/definition/oval:org.mitre.oval:def:8366
- https://oval.cisecurity.org/repository/search/definition/oval:org.mitre.oval:def:8535
- https://tomcat.apache.org/security-5.html
- https://tomcat.apache.org/security-6.html
- https://tomcat.apache.org/security-7.html
- http://www.opera.com/docs/changelogs/unix/1060
- http://www.opera.com/support/search/view/944
- https://github.com/advisories/GHSA-f7w7-6pjc-wwm6
Blast Radius: 0.0
Affected Packages
maven:org.apache.tomcat:tomcat
Dependent packages: 30Dependent repositories: 438
Downloads:
Affected Version Ranges: >= 5.0.0, < 5.5.33, >= 6.0.0, < 6.0.32, >= 7.0.0, < 7.0.10
Fixed in: 5.5.33, 6.0.32, 7.0.10
All affected versions:
All unaffected versions: 7.0.35, 7.0.37, 7.0.39, 7.0.40, 7.0.41, 7.0.42, 7.0.47, 7.0.50, 7.0.52, 7.0.53, 7.0.54, 7.0.55, 7.0.56, 7.0.57, 7.0.59, 7.0.61, 7.0.62, 7.0.63, 7.0.64, 7.0.65, 7.0.67, 7.0.68, 7.0.69, 7.0.70, 7.0.72, 7.0.73, 7.0.75, 7.0.76, 7.0.77, 7.0.78, 7.0.79, 7.0.81, 7.0.82, 7.0.84, 7.0.85, 7.0.86, 7.0.88, 7.0.90, 7.0.91, 7.0.92, 7.0.93, 7.0.94, 7.0.96, 7.0.99, 7.0.100, 7.0.103, 7.0.104, 7.0.105, 7.0.106, 7.0.107, 7.0.108, 7.0.109, 8.0.1, 8.0.3, 8.0.5, 8.0.8, 8.0.9, 8.0.11, 8.0.12, 8.0.14, 8.0.15, 8.0.17, 8.0.18, 8.0.20, 8.0.21, 8.0.22, 8.0.23, 8.0.24, 8.0.26, 8.0.27, 8.0.28, 8.0.29, 8.0.30, 8.0.32, 8.0.33, 8.0.35, 8.0.36, 8.0.37, 8.0.38, 8.0.39, 8.0.41, 8.0.42, 8.0.43, 8.0.44, 8.0.45, 8.0.46, 8.0.47, 8.0.48, 8.0.49, 8.0.50, 8.0.51, 8.0.52, 8.0.53, 8.5.0, 8.5.2, 8.5.3, 8.5.4, 8.5.5, 8.5.6, 8.5.8, 8.5.9, 8.5.11, 8.5.12, 8.5.13, 8.5.14, 8.5.15, 8.5.16, 8.5.19, 8.5.20, 8.5.21, 8.5.23, 8.5.24, 8.5.27, 8.5.28, 8.5.29, 8.5.30, 8.5.31, 8.5.32, 8.5.33, 8.5.34, 8.5.35, 8.5.37, 8.5.38, 8.5.39, 8.5.40, 8.5.41, 8.5.42, 8.5.43, 8.5.45, 8.5.46, 8.5.47, 8.5.49, 8.5.50, 8.5.51, 8.5.53, 8.5.54, 8.5.55, 8.5.56, 8.5.57, 8.5.58, 8.5.59, 8.5.60, 8.5.61, 8.5.63, 8.5.64, 8.5.65, 8.5.66, 8.5.68, 8.5.69, 8.5.70, 8.5.71, 8.5.72, 8.5.73, 8.5.75, 8.5.76, 8.5.77, 8.5.78, 8.5.79, 8.5.81, 8.5.82, 8.5.83, 8.5.84, 8.5.85, 8.5.86, 8.5.87, 8.5.88, 8.5.89, 8.5.90, 8.5.91, 8.5.92, 8.5.93, 8.5.94, 8.5.95, 8.5.96, 8.5.97, 8.5.98, 8.5.99, 8.5.100, 9.0.1, 9.0.2, 9.0.4, 9.0.5, 9.0.6, 9.0.7, 9.0.8, 9.0.10, 9.0.11, 9.0.12, 9.0.13, 9.0.14, 9.0.16, 9.0.17, 9.0.19, 9.0.20, 9.0.21, 9.0.22, 9.0.24, 9.0.26, 9.0.27, 9.0.29, 9.0.30, 9.0.31, 9.0.33, 9.0.34, 9.0.35, 9.0.36, 9.0.37, 9.0.38, 9.0.39, 9.0.40, 9.0.41, 9.0.43, 9.0.44, 9.0.45, 9.0.46, 9.0.48, 9.0.50, 9.0.52, 9.0.53, 9.0.54, 9.0.55, 9.0.56, 9.0.58, 9.0.59, 9.0.60, 9.0.62, 9.0.63, 9.0.64, 9.0.65, 9.0.67, 9.0.68, 9.0.69, 9.0.70, 9.0.71, 9.0.72, 9.0.73, 9.0.74, 9.0.75, 9.0.76, 9.0.78, 9.0.79, 9.0.80, 9.0.81, 9.0.82, 9.0.83, 9.0.84, 9.0.85, 9.0.86, 9.0.87, 9.0.88, 10.0.0, 10.0.2, 10.0.4, 10.0.5, 10.0.6, 10.0.7, 10.0.8, 10.0.10, 10.0.11, 10.0.12, 10.0.13, 10.0.14, 10.0.16, 10.0.17, 10.0.18, 10.0.20, 10.0.21, 10.0.22, 10.0.23, 10.0.26, 10.0.27, 10.1.0, 10.1.1, 10.1.2, 10.1.4, 10.1.5, 10.1.6, 10.1.7, 10.1.8, 10.1.9, 10.1.10, 10.1.11, 10.1.12, 10.1.13, 10.1.14, 10.1.15, 10.1.16, 10.1.17, 10.1.18, 10.1.19, 10.1.20, 10.1.23